Key Challenges Facing The
Future of IoT
Prof. Ahmed Banafa
College of Engineering
San Jose State University
San Jose, CA USA
• The Internet of Things (#IoT) phenomenon—
ubiquitous connected things providing key
physical data and further processing of that
data in the cloud to deliver business insights—
presents a huge opportunity for many players
in all businesses and industries.
• Many companies are organizing themselves to
focus on IoT and the connectivity of their
future products and services.
• For the IoT industry to thrive there are three
categories of challenges to overcome and this
is true for any new trend in technology not
only IoT:
Key challenges facing the future of IoT
IoT Challenges
• Technology
• Business
• Society
Technology
• This part is covering all the technologies
needed to make IoT systems function
smoothly as a standalone solution or part of
existing systems. Cloud Security Alliance
(CSA) listed some of the root causes of such
technological challenges:
• Many IoT Systems are poorly designed and
implemented, using diverse protocols and
technologies that create complex
configurations.
• Lack of mature IoT technologies and business
processes
• Limited guidance for life cycle maintenance
and management of IoT devices
• Limited best practices available for IoT
developers
• There is a lack of standards for authentication
and authorization of IoT edge devices
• There are no best practices for IoT-based
incident response activities.
• Audit and Logging standards are not defined
for IoT components
• Restricted interfaces available IoT devices to
interact with security devices and
applications.
• No focus yet on identifying methods for
achieving situational awareness of the security
posture of an organization’s IoT assets.
Technical Challenges
Security
• IoT has already turned into a serious security
concern that has drawn the attention of
prominent tech firms and government
agencies across the world.
• The hacking of baby monitors, smart fridges,
thermostats, drug infusion pumps, cameras
and even assault rifles are signifying a security
nightmare being caused by the future of IoT.
• So many new nodes being added to networks
and the internet will provide malicious actors
with innumerable attack vectors and
possibilities to carry out their evil deeds,
especially since a considerable number of
them suffer from security holes.
• This fear was realized with a massive
distributed denial of service attack that
crippled the servers of services like Twitter,
NetFlix , NYTimes, and PayPal across the U.S.
on October 21st , 2016.
• It’s the result of an immense assault that
involved millions of Internet addresses and
malicious software, according to Dyn, the
prime victim of that attack.
• "One source of the traffic for the attacks was
devices infected by the Mirai botnet" the link
to the source code of #Mirai malware is on
GitHub.
• The attack comes amid heightened
#cybersecurity fears and a rising number of
Internet security breaches.
• Preliminary indications suggested that
countless Internet of Things (IoT) devices that
power everyday technology like closed-circuit
cameras and smart-home devices were
hijacked by the malware, and used against the
servers.
• The more important shift in security will come
from the fact that IoT will become more
ingrained in our lives. Concerns will no longer
be limited to the protection of sensitive
information and assets.
• Our very lives and health can become the
target of IoT hack attacks.
Key challenges facing the future of IoT
• There are many reasons behind the state of
insecurity in IoT. Some of it has to do with the
industry being in its “gold rush” state, where
every vendor is hastily seeking to dish out the
next innovative connected gadget before
competitors do.
• Under such circumstances, functionality
becomes the main focus and #security takes a
back seat.
Key challenges facing the future of IoT
Connectivity
• Connecting so many devices will be one of the
biggest challenges of the future of IoT, and it
will defy the very structure of current
communication models and the underlying
technologies.
• At present we rely on the centralized,
server/client paradigm to authenticate,
authorize and connect different nodes in a
network.
• This model is sufficient for current IoT
ecosystems, where tens, hundreds or even
thousands of devices are involved. But when
networks grow to join billions and hundreds of
billions of devices, centralized brokered
systems will turn into a bottleneck.
• Such systems will require huge investments
and spending in maintaining cloud servers
that can handle such large amounts of
information exchange, and entire systems can
go down if the server becomes unavailable.
• The future of IoT will very much have to
depend on decentralizing IoT networks. Part
of it can become possible by moving
functionality to the edge, such as using #fog
computing models where smart devices such
as IoT hubs take charge of time-critical
operations and cloud servers take on data
gathering and analytical responsibilities.
• Other solutions involve the use of peer-to-
peer communications, where devices identify
and authenticate each other directly and
exchange information without the
involvement of a broker. Networks will be
created in meshes with no single point of
failure.
• This model will have its own set of challenges,
especially from a security perspective, but
these challenges can be met with some of the
emerging IoT technologies such as
#Blockchain.
Compatibility and Longevity
• IoT is growing in many different directions,
with many different technologies competing
to become the standard. This will cause
difficulties and require the deployment of
extra hardware and software when connecting
devices.
• Other compatibility issues stem from non-
unified cloud services, lack of standardized
#M2M protocols and diversities in firmware
and operating systems among IoT devices.
• Some of these technologies will eventually
become obsolete in the next few years,
effectively rendering the devices
implementing them useless.
• This is especially important, since in contrast
to generic computing devices which have a
lifespan of a few years, IoT appliances (such as
smart fridges or TVs) tend to remain in service
for much longer, and should be able to
function even if their manufacturer goes out
of service.
Standards
• Technology standards which include network
protocols, communication protocols, and
data-aggregation standards, are the sum of all
activities of handling, processing and storing
the data collected from the sensors.
• This aggregation increases the value of data by
increasing, the scale, scope, and frequency of
data available for analysis.
Challenges facing the adoptions of
standards within IoT
• Standard for handling unstructured data:
Structured data are stored in relational
databases and queried through #SQL for
example. Unstructured data are stored in
different types of #NoSQL databases without a
standard querying approach.
• Technical skills to leverage newer aggregation
tools: Companies that are keen on leveraging
big-data tools often face a shortage of talent
to plan, execute, and maintain systems.
Intelligent Analysis & Actions
• The last stage in IoT implementation is
extracting insights from data for analysis,
where analysis is driven by cognitive
technologies and the accompanying models
that facilitate the use of cognitive
technologies.
Factors driving adoption intelligent
analytics within the IoT
• Artificial intelligence (#AI) models can be
improved with large data sets that are more
readily available than ever before, thanks to
the lower storage
• Growth in #crowdsourcing and open- source
analytics software: Cloud-based
crowdsourcing services are leading to new
algorithms and improvements in existing ones
at an unprecedented rate.
• Real-time data processing and analysis:
Analytics tools such as complex event
processing (CEP) enable processing and
analysis of data on a real-time or a near real-
time basis, driving timely decision making and
action
Challenges facing the adoptions of
intelligent analytics within IoT
• Inaccurate analysis due to flaws in the data
and/or model: A lack of data or presence of
outliers may lead to false positives or false
negatives, thus exposing various algorithmic
limitations
• Legacy systems’ ability to analyze
unstructured data: Legacy systems are well
suited to handle structured data;
unfortunately, most IoT/business interactions
generate unstructured data
• Legacy systems’ ability to manage real- time
data: Traditional analytics software generally
works on batch-oriented processing, wherein
all the data are loaded in a batch and then
analyzed
• The second phase of this stage is intelligent
actions which can be expressed as #M2M and
M2H interfaces for example with all the
advancement in UI and UX technologies.
Factors driving adoption of intelligent
actions within the IoT
• Lower machine prices
• Improved machine functionality
• Machines “influencing” human actions
through behavioral-science rationale
• Deep Learning tools
Challenges facing the adoption of
intelligent actions within IoT
• Machines’ actions in unpredictable situations
• Information security and privacy
• Machine interoperability
• Mean-reverting human behaviors
• Slow adoption of new technologies
Business
• The bottom line is a big motivation for
starting, investing in, and operating any
business, without a sound and solid business
model for IoT we will have another bubble this
model must satisfy all the requirements for all
kinds of e-commerce; vertical markets,
horizontal markets, and consumer markets.
• But this category is always a victim of
regulatory and legal scrutiny.
• End-to-end solution providers operating in
vertical industries and delivering services using
cloud analytics will be the most successful at
monetizing a large portion of the value in IoT.
• While many IoT applications may attract modest
revenue, some can attract more. For little burden
on the existing communication infrastructure,
operators have the potential to open up a
significant source of new revenue using IoT
technologies.
Key challenges facing the future of IoT
IoT can be divided into 3 categories
based on usage and clients base:
1. Consumer IoT includes the connected devices
such as smart cars, phones, watches, laptops,
connected appliances, and entertainment systems.
2. Commercial IoT includes things like inventory
controls, device trackers, and connected medical
devices.
3. Industrial IoT covers such things as connected
electric meters, waste water systems, flow gauges,
pipeline monitors, manufacturing robots, and other
types of connected industrial devices and systems.
• Clearly, it is important to understand the value
chain and business model for the IoT
applications for each category of IoT.
Key challenges facing the future of IoT
Society
• Understanding IoT from the customers and
regulators prospective is not an easy task for
the following reasons:
• Customer demands and requirements change
constantly.
• New uses for devices—as well as new
devices—sprout and grows at breakneck
speeds.
• Inventing and reintegrating must-have
features and capabilities are expensive and
take time and resources.
• The uses for Internet of Things technology are
expanding and changing—often in uncharted
waters.
• Consumer Confidence: Each of these problems
could put a dent in consumers' desire to purchase
connected products, which would prevent the IoT
from fulfilling its true potential.
• Lack of understanding or education by consumers
of best practices for IoT devices security to help
in improving privacy, for example change default
passwords of IoT devices.
Social and Legal Challenges
Privacy
• The IoT creates unique challenges to privacy,
many that go beyond the data privacy issues
that currently exist. Much of this stems from
integrating devices into our environments
without us consciously using them.
• This is becoming more prevalent in consumer devices,
such as tracking devices for phones and cars as well as
smart televisions.
• In terms of the latter, voice recognition or vision
features are being integrated that can continuously
listen to conversations or watch for activity and
selectively transmit that data to a cloud service for
processing, which sometimes includes a third party.
• The collection of this information exposes legal and
regulatory challenges facing data protection and
privacy law.
• In addition, many IoT scenarios involve device
deployments and data collection activities
with multinational or global scope that cross
social and cultural boundaries. What will that
mean for the development of a broadly
applicable privacy protection model for the
IoT?
• In order to realize the opportunities of the IoT,
strategies will need to be developed to
respect individual privacy choices across a
broad spectrum of expectations, while still
fostering innovation in new technologies and
services.
Regulatory Standards
• Regulatory standards for data markets are
missing especially for data brokers; they are
companies that sell data collected from
various sources. Even though data appear to
be the currency of the IoT, there is a lack of
transparency about;
• Who gets access to data and how those data
are used to develop products or services and
sold to advertisers and third parties. There is a
need for clear guidelines on the retention,
use, and security of the data including
metadata (the data that describe other data).
Any questions?
Thank you!
@BanafaAhmed
https://www.linkedin.com/in/ahmedbanafa
ahmed.banafa@sjsu.edu

More Related Content

PPTX
Internet of things
PDF
Internet of Things & Its application in Smart Agriculture
PPTX
Generic visual perception processor
PPTX
Internet of things startup basic
PPTX
The Future is Internet of Things (IOT)
PPTX
What is next for IoT and IIoT
PDF
Wireless Technologies For The Internet Of Things
PPTX
Internet of thing(iot)
Internet of things
Internet of Things & Its application in Smart Agriculture
Generic visual perception processor
Internet of things startup basic
The Future is Internet of Things (IOT)
What is next for IoT and IIoT
Wireless Technologies For The Internet Of Things
Internet of thing(iot)

What's hot (20)

PDF
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
PDF
Internet of Things presentation
PPTX
Iot - Internet of Things
PPTX
Smart farming using IOT
PPTX
Internet of Things
PDF
Security challenges in IoT
PPTX
10 min IoT ppt
PPTX
Internet of Things
PPTX
ThingSpeak: apps for social things
PPTX
Internet of Things (IoT) - IK
PDF
5G and IoT Security
PPT
IoT (Internet of Things)
PPT
PDF
The IoT Advantage
PPTX
Architecture and scope of Internet of things (IoT)
PDF
Internet Of Things: Convergence
PPTX
Introduction to Deep learning
PDF
FUTURE OF IOT
PPTX
News portal
PPTX
IOT in Agriculture slide.pptx
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things presentation
Iot - Internet of Things
Smart farming using IOT
Internet of Things
Security challenges in IoT
10 min IoT ppt
Internet of Things
ThingSpeak: apps for social things
Internet of Things (IoT) - IK
5G and IoT Security
IoT (Internet of Things)
The IoT Advantage
Architecture and scope of Internet of things (IoT)
Internet Of Things: Convergence
Introduction to Deep learning
FUTURE OF IOT
News portal
IOT in Agriculture slide.pptx
Ad

Viewers also liked (20)

PPTX
7 trends of IoT in 2017
PPTX
IoT and Blockchain Convergence
PDF
Introduction to IOT & Smart City
PPTX
IoT - IT 423 ppt
PPTX
IoT implementation and Challenges
PDF
Understanding the Internet of Things Protocols
PDF
5 questions about the IoT (Internet of Things)
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
PDF
[Infographic] How will Internet of Things (IoT) change the world as we know it?
PDF
The data defined-vehicle_architecture
PDF
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
PDF
Meetup8 IoT trends 2016
PPTX
NIEC DELHI IoT Guest Lecture
PPTX
What is the internet of things v3
PPTX
Internet of Things
PPTX
IoT App Development Areas And Major Challenges
PDF
Security challenges for IoT
PDF
Internet of Things
PDF
Challenges in the IoT
7 trends of IoT in 2017
IoT and Blockchain Convergence
Introduction to IOT & Smart City
IoT - IT 423 ppt
IoT implementation and Challenges
Understanding the Internet of Things Protocols
5 questions about the IoT (Internet of Things)
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
[Infographic] How will Internet of Things (IoT) change the world as we know it?
The data defined-vehicle_architecture
Autonomous Car & Cybersecurity - IAA 2015 - New Mobility World
Meetup8 IoT trends 2016
NIEC DELHI IoT Guest Lecture
What is the internet of things v3
Internet of Things
IoT App Development Areas And Major Challenges
Security challenges for IoT
Internet of Things
Challenges in the IoT
Ad

Similar to Key challenges facing the future of IoT (20)

PPTX
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
PPTX
IoT Standardization and Implementation Challenges
PPTX
Views and myths of IoT
PPTX
Lecture 14
PPTX
A Secure Model of IoT Using Blockchain
PPTX
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
PPTX
Internet of Things: Trends and challenges for future
PPTX
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
PPTX
9 IoT predictions for 2019
PPTX
Hot technologies of 2019
PDF
Inventory of IoT slide sets
PPTX
New trends of IoT in 2018 and beyond (SJSU Conference )
PPTX
IoT-Introduction.pptx
PPT
Unit 6 Final ppt (1).ppt
PPTX
A Wake-Up Call for IoT
PPTX
Module-1.pptx
PPTX
Leveraging IOT and Latest Technologies
PPTX
8 trends of IoT in 2018
PDF
The Evolution of IoT Software Development: Past, Present, and Future
PPTX
87 seminar presentation
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
IoT Standardization and Implementation Challenges
Views and myths of IoT
Lecture 14
A Secure Model of IoT Using Blockchain
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Internet of Things: Trends and challenges for future
Module_I.pptxadsdDSSSSSSSSSSSSSSSSUGGGGGGGGGGGGG
9 IoT predictions for 2019
Hot technologies of 2019
Inventory of IoT slide sets
New trends of IoT in 2018 and beyond (SJSU Conference )
IoT-Introduction.pptx
Unit 6 Final ppt (1).ppt
A Wake-Up Call for IoT
Module-1.pptx
Leveraging IOT and Latest Technologies
8 trends of IoT in 2018
The Evolution of IoT Software Development: Past, Present, and Future
87 seminar presentation

More from Ahmed Banafa (20)

PPTX
IoT and 5G convergence
PPTX
Quantum Computing and AI
PPTX
The convergence of IoT and Quantum Computing
PPTX
Quantum Internet Explained
PPTX
IoT and Covid 19
PPTX
Quantum Teleportation
PPTX
What is zero trust model (ztm)
PPTX
How blockchain is revolutionizing crowdfunding
PPTX
Blockchain technology and supply chain management
PPTX
8 key tech trends in a post covid-19 world edited
PPTX
Blockchain Technology and COVID19
PPTX
Ten trends of blockchain in 2020
PPTX
Quantum Computing and Blockchain: Facts and Myths
PPTX
Ten Blockchain Applications
PPTX
Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond - SJSU
PDF
Secure and Smart IoT using Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond
PPTX
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
PPTX
Second line of defense for cybersecurity : Blockchain
IoT and 5G convergence
Quantum Computing and AI
The convergence of IoT and Quantum Computing
Quantum Internet Explained
IoT and Covid 19
Quantum Teleportation
What is zero trust model (ztm)
How blockchain is revolutionizing crowdfunding
Blockchain technology and supply chain management
8 key tech trends in a post covid-19 world edited
Blockchain Technology and COVID19
Ten trends of blockchain in 2020
Quantum Computing and Blockchain: Facts and Myths
Ten Blockchain Applications
Blockchain and AI
The Blockchain Wave in 2019 and Beyond - SJSU
Secure and Smart IoT using Blockchain and AI
The Blockchain Wave in 2019 and Beyond
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
Second line of defense for cybersecurity : Blockchain

Recently uploaded (20)

PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
Exploring The Internet Of Things(IOT).ppt
PPT
12 Things That Make People Trust a Website Instantly
PDF
simpleintnettestmetiaerl for the simple testint
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Understand the Gitlab_presentation_task.pdf
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PPTX
The-Importance-of-School-Sanitation.pptx
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPTX
Internet Safety for Seniors presentation
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
Alethe Consulting Corporate Profile and Solution Aproach
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Exploring The Internet Of Things(IOT).ppt
12 Things That Make People Trust a Website Instantly
simpleintnettestmetiaerl for the simple testint
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Understand the Gitlab_presentation_task.pdf
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
The-Importance-of-School-Sanitation.pptx
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
Internet Safety for Seniors presentation
Viva Digitally Software-Defined Wide Area Network.pptx
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Alethe Consulting Corporate Profile and Solution Aproach

Key challenges facing the future of IoT

  • 1. Key Challenges Facing The Future of IoT Prof. Ahmed Banafa College of Engineering San Jose State University San Jose, CA USA
  • 2. • The Internet of Things (#IoT) phenomenon— ubiquitous connected things providing key physical data and further processing of that data in the cloud to deliver business insights— presents a huge opportunity for many players in all businesses and industries.
  • 3. • Many companies are organizing themselves to focus on IoT and the connectivity of their future products and services.
  • 4. • For the IoT industry to thrive there are three categories of challenges to overcome and this is true for any new trend in technology not only IoT:
  • 6. IoT Challenges • Technology • Business • Society
  • 7. Technology • This part is covering all the technologies needed to make IoT systems function smoothly as a standalone solution or part of existing systems. Cloud Security Alliance (CSA) listed some of the root causes of such technological challenges:
  • 8. • Many IoT Systems are poorly designed and implemented, using diverse protocols and technologies that create complex configurations. • Lack of mature IoT technologies and business processes • Limited guidance for life cycle maintenance and management of IoT devices
  • 9. • Limited best practices available for IoT developers • There is a lack of standards for authentication and authorization of IoT edge devices
  • 10. • There are no best practices for IoT-based incident response activities. • Audit and Logging standards are not defined for IoT components
  • 11. • Restricted interfaces available IoT devices to interact with security devices and applications. • No focus yet on identifying methods for achieving situational awareness of the security posture of an organization’s IoT assets.
  • 13. Security • IoT has already turned into a serious security concern that has drawn the attention of prominent tech firms and government agencies across the world.
  • 14. • The hacking of baby monitors, smart fridges, thermostats, drug infusion pumps, cameras and even assault rifles are signifying a security nightmare being caused by the future of IoT.
  • 15. • So many new nodes being added to networks and the internet will provide malicious actors with innumerable attack vectors and possibilities to carry out their evil deeds, especially since a considerable number of them suffer from security holes.
  • 16. • This fear was realized with a massive distributed denial of service attack that crippled the servers of services like Twitter, NetFlix , NYTimes, and PayPal across the U.S. on October 21st , 2016.
  • 17. • It’s the result of an immense assault that involved millions of Internet addresses and malicious software, according to Dyn, the prime victim of that attack.
  • 18. • "One source of the traffic for the attacks was devices infected by the Mirai botnet" the link to the source code of #Mirai malware is on GitHub. • The attack comes amid heightened #cybersecurity fears and a rising number of Internet security breaches.
  • 19. • Preliminary indications suggested that countless Internet of Things (IoT) devices that power everyday technology like closed-circuit cameras and smart-home devices were hijacked by the malware, and used against the servers.
  • 20. • The more important shift in security will come from the fact that IoT will become more ingrained in our lives. Concerns will no longer be limited to the protection of sensitive information and assets. • Our very lives and health can become the target of IoT hack attacks.
  • 22. • There are many reasons behind the state of insecurity in IoT. Some of it has to do with the industry being in its “gold rush” state, where every vendor is hastily seeking to dish out the next innovative connected gadget before competitors do. • Under such circumstances, functionality becomes the main focus and #security takes a back seat.
  • 24. Connectivity • Connecting so many devices will be one of the biggest challenges of the future of IoT, and it will defy the very structure of current communication models and the underlying technologies. • At present we rely on the centralized, server/client paradigm to authenticate, authorize and connect different nodes in a network.
  • 25. • This model is sufficient for current IoT ecosystems, where tens, hundreds or even thousands of devices are involved. But when networks grow to join billions and hundreds of billions of devices, centralized brokered systems will turn into a bottleneck.
  • 26. • Such systems will require huge investments and spending in maintaining cloud servers that can handle such large amounts of information exchange, and entire systems can go down if the server becomes unavailable.
  • 27. • The future of IoT will very much have to depend on decentralizing IoT networks. Part of it can become possible by moving functionality to the edge, such as using #fog computing models where smart devices such as IoT hubs take charge of time-critical operations and cloud servers take on data gathering and analytical responsibilities.
  • 28. • Other solutions involve the use of peer-to- peer communications, where devices identify and authenticate each other directly and exchange information without the involvement of a broker. Networks will be created in meshes with no single point of failure.
  • 29. • This model will have its own set of challenges, especially from a security perspective, but these challenges can be met with some of the emerging IoT technologies such as #Blockchain.
  • 30. Compatibility and Longevity • IoT is growing in many different directions, with many different technologies competing to become the standard. This will cause difficulties and require the deployment of extra hardware and software when connecting devices.
  • 31. • Other compatibility issues stem from non- unified cloud services, lack of standardized #M2M protocols and diversities in firmware and operating systems among IoT devices.
  • 32. • Some of these technologies will eventually become obsolete in the next few years, effectively rendering the devices implementing them useless.
  • 33. • This is especially important, since in contrast to generic computing devices which have a lifespan of a few years, IoT appliances (such as smart fridges or TVs) tend to remain in service for much longer, and should be able to function even if their manufacturer goes out of service.
  • 34. Standards • Technology standards which include network protocols, communication protocols, and data-aggregation standards, are the sum of all activities of handling, processing and storing the data collected from the sensors. • This aggregation increases the value of data by increasing, the scale, scope, and frequency of data available for analysis.
  • 35. Challenges facing the adoptions of standards within IoT • Standard for handling unstructured data: Structured data are stored in relational databases and queried through #SQL for example. Unstructured data are stored in different types of #NoSQL databases without a standard querying approach.
  • 36. • Technical skills to leverage newer aggregation tools: Companies that are keen on leveraging big-data tools often face a shortage of talent to plan, execute, and maintain systems.
  • 37. Intelligent Analysis & Actions • The last stage in IoT implementation is extracting insights from data for analysis, where analysis is driven by cognitive technologies and the accompanying models that facilitate the use of cognitive technologies.
  • 38. Factors driving adoption intelligent analytics within the IoT • Artificial intelligence (#AI) models can be improved with large data sets that are more readily available than ever before, thanks to the lower storage
  • 39. • Growth in #crowdsourcing and open- source analytics software: Cloud-based crowdsourcing services are leading to new algorithms and improvements in existing ones at an unprecedented rate.
  • 40. • Real-time data processing and analysis: Analytics tools such as complex event processing (CEP) enable processing and analysis of data on a real-time or a near real- time basis, driving timely decision making and action
  • 41. Challenges facing the adoptions of intelligent analytics within IoT • Inaccurate analysis due to flaws in the data and/or model: A lack of data or presence of outliers may lead to false positives or false negatives, thus exposing various algorithmic limitations
  • 42. • Legacy systems’ ability to analyze unstructured data: Legacy systems are well suited to handle structured data; unfortunately, most IoT/business interactions generate unstructured data
  • 43. • Legacy systems’ ability to manage real- time data: Traditional analytics software generally works on batch-oriented processing, wherein all the data are loaded in a batch and then analyzed
  • 44. • The second phase of this stage is intelligent actions which can be expressed as #M2M and M2H interfaces for example with all the advancement in UI and UX technologies.
  • 45. Factors driving adoption of intelligent actions within the IoT • Lower machine prices • Improved machine functionality • Machines “influencing” human actions through behavioral-science rationale • Deep Learning tools
  • 46. Challenges facing the adoption of intelligent actions within IoT • Machines’ actions in unpredictable situations • Information security and privacy • Machine interoperability • Mean-reverting human behaviors • Slow adoption of new technologies
  • 47. Business • The bottom line is a big motivation for starting, investing in, and operating any business, without a sound and solid business model for IoT we will have another bubble this model must satisfy all the requirements for all kinds of e-commerce; vertical markets, horizontal markets, and consumer markets. • But this category is always a victim of regulatory and legal scrutiny.
  • 48. • End-to-end solution providers operating in vertical industries and delivering services using cloud analytics will be the most successful at monetizing a large portion of the value in IoT. • While many IoT applications may attract modest revenue, some can attract more. For little burden on the existing communication infrastructure, operators have the potential to open up a significant source of new revenue using IoT technologies.
  • 50. IoT can be divided into 3 categories based on usage and clients base:
  • 51. 1. Consumer IoT includes the connected devices such as smart cars, phones, watches, laptops, connected appliances, and entertainment systems. 2. Commercial IoT includes things like inventory controls, device trackers, and connected medical devices. 3. Industrial IoT covers such things as connected electric meters, waste water systems, flow gauges, pipeline monitors, manufacturing robots, and other types of connected industrial devices and systems.
  • 52. • Clearly, it is important to understand the value chain and business model for the IoT applications for each category of IoT.
  • 54. Society • Understanding IoT from the customers and regulators prospective is not an easy task for the following reasons:
  • 55. • Customer demands and requirements change constantly. • New uses for devices—as well as new devices—sprout and grows at breakneck speeds. • Inventing and reintegrating must-have features and capabilities are expensive and take time and resources.
  • 56. • The uses for Internet of Things technology are expanding and changing—often in uncharted waters. • Consumer Confidence: Each of these problems could put a dent in consumers' desire to purchase connected products, which would prevent the IoT from fulfilling its true potential. • Lack of understanding or education by consumers of best practices for IoT devices security to help in improving privacy, for example change default passwords of IoT devices.
  • 57. Social and Legal Challenges
  • 58. Privacy • The IoT creates unique challenges to privacy, many that go beyond the data privacy issues that currently exist. Much of this stems from integrating devices into our environments without us consciously using them.
  • 59. • This is becoming more prevalent in consumer devices, such as tracking devices for phones and cars as well as smart televisions. • In terms of the latter, voice recognition or vision features are being integrated that can continuously listen to conversations or watch for activity and selectively transmit that data to a cloud service for processing, which sometimes includes a third party. • The collection of this information exposes legal and regulatory challenges facing data protection and privacy law.
  • 60. • In addition, many IoT scenarios involve device deployments and data collection activities with multinational or global scope that cross social and cultural boundaries. What will that mean for the development of a broadly applicable privacy protection model for the IoT?
  • 61. • In order to realize the opportunities of the IoT, strategies will need to be developed to respect individual privacy choices across a broad spectrum of expectations, while still fostering innovation in new technologies and services.
  • 62. Regulatory Standards • Regulatory standards for data markets are missing especially for data brokers; they are companies that sell data collected from various sources. Even though data appear to be the currency of the IoT, there is a lack of transparency about;
  • 63. • Who gets access to data and how those data are used to develop products or services and sold to advertisers and third parties. There is a need for clear guidelines on the retention, use, and security of the data including metadata (the data that describe other data).